The 2-day ProxySG 6.6 Basic Administration course is an introduction to deployment options and management of the individual key features offered using the ProxySG 6.6 solution.
This an introductory course and is designed for students who are new to the Proxy SG solution.
This course includes practical hands-on exercises that enable you to test your new skills and begin to use those skills in a working environment.
The ProxySG 6.6 Basic Administration course is intended for students who wish to master the fundamentals of the ProxySG. It is designed for students who have not taken any previous training courses about the ProxySG.
This course assumes that students have a basic understanding of networking concepts, such as local-area networks (LANs), the Internet, security, and IP protocols.
Delegates will learn how to
By the completion of this course, you will be able to:
• Describe the major Secure Web Gateway functions of the ProxySG
• License and configure a ProxySG
• Deploy a ProxySG in either explicit or transparent mode
• Use the Visual Policy Manager to write policies to manage web filtering, authentication, and SSL traffic management
• Use ProxySG access logs to generate reports
Module 1: Introduction to the Symantec ProxySG Secure Web Gateway
• Describe the functions of a proxy server
• Differentiate proxy servers from firewalls
• Describe the key features and benefits of the ProxySG
• List the various ProxySG models
• Access online Symantec community resources
Module 2: ProxySG Security Deployment Options
• Describe the three network deployment methods
• Describe the three possible roles of the ProxySG
Module 3: ProxySG Management Console
• Describe the relationship between the Management Console and the ProxySG CLI
• Describe the primary function of the major areas of the Management Console
• Use the Management Console to access on-box help and Symantec product documentation
Module 4: Traffic Interception Using Proxy Services
• Understand the functions of proxy services, listeners, and proxy types
• Describe the three most common proxy services
• Explain how the intercept and bypass settings affect what happens to network traffic passing through the ProxySG
• Explain the function of common global proxy service settings
Module 5: Hypertext Transfer Protocol
• Understand how a connection is initiated over the transport layer
• Identify the components of an HTTP URL
• Explain the two types of HTTP messages: request and response
• Identify common response codes
Module 6: Introduction to the Visual Policy Manager
• Describe the relationship among the VPM, CPL, and the Management Console
• Describe the default processing order for policy layers and rules
• Describe triggers and actions that can be used in writing policy
• Identify the types of objects that the VPM supports
• Describe some of the best practices to be followed when using the VPM to create policy
Module 7: Filtering Web Content
• Describe the main concepts of web filtering
• Describe the primary category databases
• Describe the category types available to policy
• Describe how WebFilter and WebPulse work together
Module 8: Using Threat Intelligence to Defend the Network
• Understand Intelligence Services as provided by the Global Intelligence Network
• Understand Geolocation and Threat Risk Levels and how they can be used in policy
Module 9: Ensuring Safe Downloads
• Describe how malware can be transmitted via HTTP
• Explain the methods, advantages, and disadvantages of file type detection
• Describe some of the considerations in deciding what content to block as possible malware sources
Module 10: Notifying User of Internet Usage Policies
• Explain the function and various components of built-in and custom exception pages
• Describe the function of Notify User objects
• Identify the types of pages that can be sent to users by using Notify User objects
• Describe splash pages and coaching pages using Notify User objects in the VPM
Module 11: Access Logging on the ProxySG
• Describe, at a high level, how the ProxySG performs access logging
• Describe the components of a ProxySG access log facility
• Identify default log facilities and log formats
• Describe common use cases for periodic and continuous uploading of access logs
Appendix A: ProxySG Initial Configuration
Appendix B: IPv6 in ProxySG Deployments
Frequently asked questionsSee all of our FAQs
How can I create an account on myQA.com?
There are a number of ways to create an account. If you are a self-funder, simply select the "Create account" option on the login page.
If you have been booked onto a course by your company, you will receive a confirmation email. From this email, select "Sign into myQA" and you will be taken to the "Create account" page. Complete all of the details and select "Create account".
If you have the booking number you can also go here and select the "I have a booking number" option. Enter the booking reference and your surname. If the details match, you will be taken to the "Create account" page from where you can enter your details and confirm your account.
Find more answers to frequently asked questions in our FAQs: Bookings & Cancellations page.
How do QA’s virtual classroom courses work?
Our virtual classroom courses allow you to access award-winning classroom training, without leaving your home or office. Our learning professionals are specially trained on how to interact with remote attendees and our remote labs ensure all participants can take part in hands-on exercises wherever they are.
We use the WebEx video conferencing platform by Cisco. Before you book, check that you meet the WebEx system requirements and run a test meeting (more details in the link below) to ensure the software is compatible with your firewall settings. If it doesn’t work, try adjusting your settings or contact your IT department about permitting the website.
Learn more about our Virtual Classrooms.
How do QA’s online courses work?
QA online courses, also commonly known as distance learning courses or elearning courses, take the form of interactive software designed for individual learning, but you will also have access to full support from our subject-matter experts for the duration of your course. When you book a QA online learning course you will receive immediate access to it through our e-learning platform and you can start to learn straight away, from any compatible device. Access to the online learning platform is valid for one year from the booking date.
All courses are built around case studies and presented in an engaging format, which includes storytelling elements, video, audio and humour. Every case study is supported by sample documents and a collection of Knowledge Nuggets that provide more in-depth detail on the wider processes.
Learn more about QA’s online courses.
When will I receive my joining instructions?
Joining instructions for QA courses are sent two weeks prior to the course start date, or immediately if the booking is confirmed within this timeframe. For course bookings made via QA but delivered by a third-party supplier, joining instructions are sent to attendees prior to the training course, but timescales vary depending on each supplier’s terms. Read more FAQs.
When will I receive my certificate?
Certificates of Achievement are issued at the end the course, either as a hard copy or via email. Read more here.